Thursday, December 19, 2024
HomeMalwareHackers Steals Facebook Account Details Using Android Malware

Hackers Steals Facebook Account Details Using Android Malware

Published on

SIEM as a Service

New Android malware discovered that steals Facebook credentials, account details such as username and Passwords and other information directly from users devices.

This Malware mainly targeting the Asian Pacific-based English speaking users and it spreading via the third-party market.

This new credential stealer contains a lot of aggressive function and malware author using new sophisticated functionality to compromise the victim’s device and steal the credentials.

- Advertisement - SIEM as a Service

Also Read: A Facebook Vulnerability that Allows to Reveals the Facebook Page Admin Identity

How does this Malware steal Facebook Details

Once this Malware infects the victims initially it hide from the home screen and silently running in the background.

It will check the infected devices Facebook account by submitting the infected mobiles IMEI number to the attacker via command and control server.

If the malware did not collect any details regards the infected device Facebook account, it will very the apps list whether or not Facebook app installed.

Once it did not find the app then the malware launch the fake Facebook interface to compromise the victims and steal the victim’s original username and password.

This malware keeps display this interface until it successfully collects the Facebook credentials by using the JavaScript from a hidden WebView, the threat silently logs into the compromised Facebook account.

In this case, it also checks whether CAPTCHA is presented or not. if yes then it sends the event to the C&C server, clears caches and cookies, and retries later.

According to Symantec, Once the malware is logged into the Facebook page, it can leverage a wide range of capabilities to follow links and scrape the personal data of the victim and their friends, sending it back to the C&C server. This includes:
General top-level data: Facebook account, user, password, device IMEI
Profile: Work, education, location, contacts, basic info, nicknames, relationships, family, bio
Activities: Check in, events, friends, groups, likes, pages, posts

This malware using the functionality that crawls the Facebook page has a surprising level of sophistication. and the crawler has an ability to crawl the search and collect the Facebook search.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one...

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary...